Логотип exploitDog
bind:CVE-2024-42507
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-42507

Количество 3

Количество 3

nvd логотип

CVE-2024-42507

больше 1 года назад

Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-p2cr-39jq-4vw3

больше 1 года назад

Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2025-06275

больше 1 года назад

Уязвимость интерфейса CLI микропрограммного обеспечения точек доступа HPE Aruba Networking Access Points, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-42507

Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
1%
Низкий
больше 1 года назад
github логотип
GHSA-p2cr-39jq-4vw3

Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
1%
Низкий
больше 1 года назад
fstec логотип
BDU:2025-06275

Уязвимость интерфейса CLI микропрограммного обеспечения точек доступа HPE Aruba Networking Access Points, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
1%
Низкий
больше 1 года назад

Уязвимостей на страницу